Analysis

  • max time kernel
    137s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 17:17

General

  • Target

    fd4a5c01d3b10976ae44029e7672e1b0.exe

  • Size

    672KB

  • MD5

    fd4a5c01d3b10976ae44029e7672e1b0

  • SHA1

    50a8d46d87c47572e6f30dfafd11ce9964c064ab

  • SHA256

    378a19ddfac8651e76b0abb65fb7afd10e973322be7148a8f97adb16dbd057a9

  • SHA512

    ee524662d83f36ce0c5da186e26332b97d2bea4a507734d8a8dbcd8da4732e2e279235481eb9e2b657d84632e7cd7e12070337e1575d0169315b3c5e3829be18

  • SSDEEP

    12288:seBNUbTVO86UCHruRdp+WA00SKCpVRwfXXSVUhbxk9e/pJu:sJIUCNd0nKwYvX+UhbW9eM

Malware Config

Signatures

  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 6 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 26 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd4a5c01d3b10976ae44029e7672e1b0.exe
    "C:\Users\Admin\AppData\Local\Temp\fd4a5c01d3b10976ae44029e7672e1b0.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2200
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Windows security modification
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • System policy modification
    PID:2984
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    PID:2592
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2548
  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1736
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    PID:1324
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2308
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 184 -InterruptEvent 170 -NGENProcess 174 -Pipe 180 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1540
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 17c -InterruptEvent 218 -NGENProcess 220 -Pipe 224 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:860
  • C:\Windows\system32\dllhost.exe
    C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2768

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\iardraeb\cmd.exe

          Filesize

          92KB

          MD5

          007ab38408a11fab2f3fa3cbc09db108

          SHA1

          02ad4cb3663f9f008d584220a77d4ff5201e72a1

          SHA256

          92734bc8b668f2c8b6f41233fe15ca2660e2d04503e11407d443d27c6a6f6d77

          SHA512

          6ce8bfd05aedaa7b92693726005163fd002713012b3384a1646c6545ee088d140a00426633a2b33fa409966fb23cdb17affe07a397807601bf0a47e8fe77e2a3

        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log

          Filesize

          872KB

          MD5

          60904b7250e399a88e6249ea70571578

          SHA1

          690e40d2050caa4872680802db1b98229e8e23b8

          SHA256

          45712da7798314a28ce86323cb9e8ea84a1b4402d1f4cc166d9b1c43edc16c26

          SHA512

          62323b19a80ad85198d0e116d3ff76f8ac82cff7103686bb2df0880eea6ebf483150eae6e6d280055a16b8eb4ec44ae0424718e892f66712197c3f9da8d3bfaa

        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

          Filesize

          257KB

          MD5

          7cb6a346608111defffcb417e5747602

          SHA1

          07f76eb105e6ad3143355fda920ac032fd763387

          SHA256

          7938be3a7e9827c3fd771036f5cb946483ae8b3d12c799e517ca5d52a361fe62

          SHA512

          b87157a6a73c639b600154c5e9a89562cec3108fc0d8a08fe73733bc13b425743e763db814abc6384b1f1e02d4f8e6f7bf4cbb88fcac1f76789796e1c4ae3914

        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

          Filesize

          453KB

          MD5

          cad77d6732386173df7e15d75d9e1d73

          SHA1

          7624232526db6399fb28a90339f9c66d3c3148ac

          SHA256

          08c088eead8d9a27d3157cdf9381362bf6ac9f4dadae01aa40bde91c93c8bc16

          SHA512

          8660f45c9828a0e50169fb754e04bb63e1555b292e6163356bcde70b76fa994dc8053e4b5ea0ffc2d68b906caac654fb2e23b6b07ef6b37de8f78628930b7e83

        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

          Filesize

          1003KB

          MD5

          551f26f3fa5831769bca0d96e9a64c67

          SHA1

          1ac6439398fb9f085da7bf878877d721c3dffa37

          SHA256

          c7c990fd2e56e1817333ecf02111b7ce74ef40286e3a421c0e64b5b5b5fca860

          SHA512

          2b83a73828b26b61c05dd88ebcafbd2ff7c31736d7308a14b09720754226c535cd120068d201b2540f44b03a5bd68f0d875b497d57af98ef6d0a781125e45051

        • C:\Windows\System32\alg.exe

          Filesize

          92KB

          MD5

          c2a4642e07fdcc66f593cd02eb3eeff3

          SHA1

          6524bad1fd395fd3804bef0b90b9fbcbcc89a750

          SHA256

          e5e260ca42b67266667c0e9d912c476e2ec44fae1082a1fcc8cc48860b830ccb

          SHA512

          ed1b8301ce96521aa4d4c458e1fbc8ea80f9a7c8bf6985ca7c9226fe2bfc6f7e23cf45fef89d98dda30cfd5045031ed3f4ca9f6e64f70cde3c4deea3ec6f8eeb

        • C:\Windows\System32\dllhost.exe

          Filesize

          405KB

          MD5

          9ca2c69eec5b4fa8fde1554170acf9d0

          SHA1

          6fd4fe15ed3269469436609ebf4dbb148676934a

          SHA256

          b0a2873c91a609535b5ab0a66b0e84858aea41cf2042b0de1349a061ea169a4f

          SHA512

          0ea82342532b2de668d5dbb89d3ce3e07256e6159cf584ae1081e7b4477b779ebb480ded4720362e270fbe2253497f0cb33fbc91381f0b10f112709901512b01

        • \??\c:\program files (x86)\microsoft office\office14\groove.exe

          Filesize

          381KB

          MD5

          98dcd4a8cda99aeb728ff946903d76e6

          SHA1

          798237beeedb69e1d2337f8737ecc3381cb3fa2f

          SHA256

          4fcf729c0b569dd8e4fa56cb9e7c674bfbf1167214c2d009637177fd32ce07fb

          SHA512

          6dcbb2a5892b3c2405cc54e776d995acf715865fadfee5066ff76f3281c17b35b1e207c3bf9d9c93b2b4261fd9c41cc07962caff208228e008499f4a66e21ba6

        • \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe

          Filesize

          613KB

          MD5

          f8b9fc27f5b63c53af34a7630dc1e2f6

          SHA1

          54b9de6bf5d06421990ea859d4987194c7543018

          SHA256

          567c1e889eb77e859069a0655bd58b2f2fc3cc64c4774c204ddb336013f5787a

          SHA512

          390a89fbeb22dd4954fb1579c7187279f57e557d078c1582a7938d260f509599cb09e07b8603deeb32cf433b87095ebe4901d28d96c32452cc507e780d4d8cdb

        • \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.exe

          Filesize

          217KB

          MD5

          dc6d67c8a804d42c8e51d00072e5916c

          SHA1

          6d4f271dcb97367d8772b2a24ffb4dfe187306b4

          SHA256

          225a6ebedd6543734da4218b0420eab50464ec4bcea325734cc1bc631fd71868

          SHA512

          4750d709f8ff6b14462a71ee88153a01ba08292e104648dc5b7d340a5edda1394d4851a15860a2285be1161f10136429371bde8d4b64f8140829d84f7b503b39

        • \??\c:\windows\microsoft.net\framework64\v4.0.30319\mscorsvw.exe

          Filesize

          506KB

          MD5

          47c9473fb11cc0fe68fb38e0ac4b7700

          SHA1

          bd4902e7782ee06e04598a0d2139eb9aed5ac42f

          SHA256

          c687a70e3a3b590c3f75d9e0345c6baad4b4298db353609b6dc69846615bbed3

          SHA512

          b082c1dcb0a1e2263dacf22d8f288ce2911ff60a71d4b17f703256dbc838654adf382dd33ce76b4019d6205e70c61e68c27f316d73e61a81ae445b3231b85c63

        • \??\c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe

          Filesize

          484KB

          MD5

          8e6309b5a8bea44d44691dafe3990081

          SHA1

          caff5e8ceeb8171b0d2fc04b8316b33da0b676e9

          SHA256

          7af5a25c6f8e7e22c070edb2fdf2540d99204197aed096789838cd9ce205b9df

          SHA512

          2318f860cbad2776e7ff5625718f21e8b6b3b9ac438fea5e31d41e186da8488353dff9837255c8dd1f8ca6279f0e6387cb2f0172cd5f02798ebb9de3e8e86251

        • \Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe

          Filesize

          480KB

          MD5

          7c85be363eb0fd3f77ba0db449fc165f

          SHA1

          c26c42574bf2a0dd76fb218089812cad5308b2f0

          SHA256

          a046a6646f3ec6e0b6324f00fd283af3bd33f9726fcbd99be0f355c044fffc06

          SHA512

          8ee58b9d26a864281b636a6af530487c08d4e44d12e8ee35673ad7342443a1b7b38fd2fa74e76bbe3ea482cb7781978784aaa09b37e11a68a89e37e0c36147de

        • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

          Filesize

          431KB

          MD5

          1e4083235237847e4bdbe5920e263c78

          SHA1

          f8254086761fce4d4fc7cbe97535128ada4a1b48

          SHA256

          106a8919e5ff1eaa6b3b7001f0229c24c436a87d74a964e015cd8b5f9e7e5b77

          SHA512

          ec96672f93de36049cd7f8596173c440265e67325bf3228e233fbf8dc46c595ce73e69c6592918d0f6a77a6325ee3ff7092d2bb511a9e5c22b110c7f7559352f

        • \Windows\System32\alg.exe

          Filesize

          472KB

          MD5

          3d944b6bc8a8f4d9a1284422f5f3d8cd

          SHA1

          2e0a7ed1d18a1b0bfabfcb1c453e4c86b0e9bc9e

          SHA256

          4ee4f0dc5b3b50eaaaa979fb6ad65a5e9233d507bf1faa14ed0113a9e62b87e5

          SHA512

          64c9b611e6ccc3504673c75c3e4c5fd7891a79e5843d4f07bc870fc87706268f875c65927675328c4f1a86eaf373fbfe9bdefb7d4c6ef3df1658cd4d5fd044a3

        • memory/860-129-0x000007FEF5A40000-0x000007FEF642C000-memory.dmp

          Filesize

          9.9MB

        • memory/860-122-0x000000013F840000-0x000000013F917000-memory.dmp

          Filesize

          860KB

        • memory/860-124-0x000000013F840000-0x000000013F917000-memory.dmp

          Filesize

          860KB

        • memory/860-134-0x000000013F840000-0x000000013F917000-memory.dmp

          Filesize

          860KB

        • memory/860-135-0x000007FEF5A40000-0x000007FEF642C000-memory.dmp

          Filesize

          9.9MB

        • memory/1540-100-0x000007FEF5A40000-0x000007FEF642C000-memory.dmp

          Filesize

          9.9MB

        • memory/1540-99-0x000000013F840000-0x000000013F917000-memory.dmp

          Filesize

          860KB

        • memory/1540-98-0x000000013F840000-0x000000013F917000-memory.dmp

          Filesize

          860KB

        • memory/1540-130-0x000000013F840000-0x000000013F917000-memory.dmp

          Filesize

          860KB

        • memory/1540-131-0x000007FEF5A40000-0x000007FEF642C000-memory.dmp

          Filesize

          9.9MB

        • memory/1736-59-0x0000000010000000-0x00000000100D1000-memory.dmp

          Filesize

          836KB

        • memory/1736-60-0x0000000010000000-0x00000000100D1000-memory.dmp

          Filesize

          836KB

        • memory/1736-70-0x0000000010000000-0x00000000100D1000-memory.dmp

          Filesize

          836KB

        • memory/2200-1-0x000000013F2E0000-0x000000013F3E0000-memory.dmp

          Filesize

          1024KB

        • memory/2200-0-0x000000013F2E0000-0x000000013F3E0000-memory.dmp

          Filesize

          1024KB

        • memory/2200-19-0x000000013F2E0000-0x000000013F3E0000-memory.dmp

          Filesize

          1024KB

        • memory/2200-17-0x000000013F2E0000-0x000000013F3E0000-memory.dmp

          Filesize

          1024KB

        • memory/2200-3-0x000000013F2E0000-0x000000013F3E0000-memory.dmp

          Filesize

          1024KB

        • memory/2308-78-0x000000013F840000-0x000000013F917000-memory.dmp

          Filesize

          860KB

        • memory/2308-123-0x000000013F840000-0x000000013F917000-memory.dmp

          Filesize

          860KB

        • memory/2308-77-0x000000013F840000-0x000000013F917000-memory.dmp

          Filesize

          860KB

        • memory/2548-43-0x0000000010000000-0x00000000100A4000-memory.dmp

          Filesize

          656KB

        • memory/2548-36-0x0000000010000000-0x00000000100A4000-memory.dmp

          Filesize

          656KB

        • memory/2548-35-0x0000000010000000-0x00000000100A4000-memory.dmp

          Filesize

          656KB

        • memory/2592-55-0x000000013FFE0000-0x00000001400A6000-memory.dmp

          Filesize

          792KB

        • memory/2592-27-0x000000013FFE0000-0x00000001400A6000-memory.dmp

          Filesize

          792KB

        • memory/2592-28-0x000000013FFE0000-0x00000001400A6000-memory.dmp

          Filesize

          792KB

        • memory/2768-93-0x00000000FF730000-0x00000000FF7EE000-memory.dmp

          Filesize

          760KB

        • memory/2768-133-0x00000000FF730000-0x00000000FF7EE000-memory.dmp

          Filesize

          760KB

        • memory/2768-94-0x00000000FF730000-0x00000000FF7EE000-memory.dmp

          Filesize

          760KB

        • memory/2984-29-0x00000000FF630000-0x00000000FF6FD000-memory.dmp

          Filesize

          820KB

        • memory/2984-20-0x00000000FF630000-0x00000000FF6FD000-memory.dmp

          Filesize

          820KB

        • memory/2984-53-0x00000000FF630000-0x00000000FF6FD000-memory.dmp

          Filesize

          820KB

        • memory/2984-18-0x00000000FF630000-0x00000000FF6FD000-memory.dmp

          Filesize

          820KB

        • memory/2984-54-0x00000000FF630000-0x00000000FF6FD000-memory.dmp

          Filesize

          820KB